Dynamic Channel Sharing in Open-Spectrum Wireless Networks
|
|
- Johnathan McDowell
- 6 years ago
- Views:
Transcription
1 Dynamic Channel Sharing in Open-Spectrum Wireless Networks Wei Wang and Xin Liu Department of Computer Science University of California, Davis Davis, CA 91, U. S. A. {wangw, Abstract The current fixed spectrum allocation scheme leads to significant spectrum white spaces. It requires a more effective spectrum allocation and utilization policy, which allows unused parts of spectrum to become available temporarily for commercial purposes so that the scarcity of the spectrum can be largely mitigated. This paper is an early attempt to study such wireless networks with opportunistic spectrum availability and access. We studied the dynamics in the available channels caused by the location and traffic load of the primary users and proposed several distributed algorithms to exploit the available channels for secondary users. The performance of different algorithms is evaluated in networks with static and time-varying channel availability. I. INTRODUCTION The current fixed spectrum allocation scheme can lead to significant spectrum white spaces (spectrum that is not used at all for some time). Experiments conducted by Shared Spectrum Company indicate as much as 2% of white space below 3GHz band even in the most crowed area near downtown Washington DC, where both government and commercial spectrum usage are intensive [1]. Such low utilization and increasing demand for the radio spectrum suggest a more effective spectrum allocation and utilization policy, which allows unused parts of spectrum to become available temporarily for commercial purposes so that the scarcity of the spectrum can be largely mitigated. In this paper, we focus on the opportunistic exploration of the white space by users other than the primary licensed ones on a non-interfering or leasing basis. Such usage is being enabled by regulatory policy initiatives and radio technology advances. First, both the Federal Communications Commission (FCC) and the federal government have made important initiatives towards more flexible and dynamic spectrum usage, e.g., [2], [3]. Further, opportunistic spectrum sharing is enabled by software-defined radio or cognitive radio technologies, where these technology advances provide the capability for a radio device to sense and operate on a wide range of frequencies using appropriate communication mechanisms, and thus enable dynamic and more intense spectrum reuse in space, time, and frequency dimensions. We focus on the study of the secondary users who observe the channel availability dynamically and explore it opportunistically. Here, secondary users refer to spectrum users who are not owner of the spectrum and operate based on agreements/etiquettes imposed by the primary users/owners of the spectrum. We study the impact of the opportunistic spectrum availability on the secondary users who explore the spectrum when allowed by the primary users of the spectrum. (Note that the secondary users may have their own licensed/allocated bandwidth where they are primary users, which is not the concern of this paper.) Because of the traffic load and the distribution of the primary users, the available channels observed by the secondary users are time-varying and location-dependent. We study the impact of the characteristics of primary users on the spectrum opportunistic availability. We present a general framework to model the correlation between primary and secondary users and introduce a new metric to capture the impact of potential opportunistic spectrum sharing. We also propose several distributed spectrum access algorithms and study their performance under the above-mentioned time-varying and location-dependent channel availabilities. II. A FRAMEWORK FOR OPEN SPECTRUM CHANNEL SHARING We first introduce a model for channel availability observed by the secondary users. Note that such availabilities are location-dependent and time-varying, which is incurred by the activities of the primary users. We abstract each network topology into a graph, where vertexes represent wireless users such as wireless lines, WLANs, or cells, and edges represent interferences between vertexes. In particular, if two vertexes are connected by an edge in the graph, we assume that these two nodes cannot use the same spectrum simultaneously. In addition, we associate with each vertex a set, which represents the available spectra at this location. Due to the differences in the geographical location of each vertex, the sets of spectra of different nodes may be different. Furthermore, a node may observe time-varying channel availability due to the traffic load variation of the primary users. In Figure 1, we show a model of such networks. The five vertexes 1- represent five different secondary or opportunistic users. There are three frequency bands, namely A, B, and C, which are communication channels that are opportunistically available to the secondary users (vertexes 1- in this figure). We assume that all channels have the same bandwidth, which can be generalized easily. In addition, four primary users I- IV are present, using bands B, A, B, and C, respectively.
2 Fig. 1. A color graph Due to the sharing agreement, channels used by primary users cannot be utilized by secondary users in vicinity. Therefore, we assume that nodes within certain ranges of the primary users I-IV cannot reuse the same frequency. In other words, if a vertex is within the dashed circle of a specific primary user, it cannot access that bandwidth used by that primary user. For instance, Node 2 is within the interference range of primary user I, who uses channel B. Therefore, channel B is not available for Node 2. As a consequence, each node has access to a different set of bandwidths. In our figure, the available channels are (A,B,C) at vertex 1, (A,C) at vertex 2, etc. The resource allocation problem is how they should share these bandwidth. Note that Figure 1 shows a snapshot of the network. In practice, time-varying channel availability could be introduced by the mobility of users (both primary and secondary) and the traffic load variation of primary users. For instance, in the numerical results, we introduce the time-varying channel availability at secondary users by varying the usage of primary users. We consider a time-slotted system. In a generic time slot, if a primary user occupies one channel, it will keep the same channel in the next time slot with the probability p 11 ; if a primary user is idle on one channel, it will occupy a channel in the next time slot with the probability p 1. Then, the channel availability of a secondary user varies at each time slot depending on all the primary users. Such policy can be considered as an approximate exponential ON/OFF traffic model for the primary users. Other traffic models can be introduced similarly. When channel availabilities change, secondary users need to adjust their channel allocation accordingly. They may also need to exchange information with neighboring nodes. However, secondary users may have limited ability of information exchange and experience delay during information exchange because secondary users coexist in an ad-hoc manner. This is different from celluar systems where dedicated (and private) signalling channels exist between cells. Limit information exchange imposes an additional challenge on opportunistic channel sharing algorithms. We make the following assumptions in the paper. We assume that channel availabilities are given to secondary users, and focus on how to share the opportunistic spectrum among secondary users. We acknowledge that it is a challenging problem in itself to decide whether a spectrum can be used by the secondary users. The proposals for solving this problem include carrier sensing, signal-strength based methods, beacon-based methods (a beacon indicates the availability of unavailability of a spectrum), location and database based mechanisms (a node has location information and can check a database about the availability of a spectrum), etc. Furthermore, we assume that secondary users have elastic data traffic and can fully utilize the amount of spectrum being allocated. This is the benchmark case in terms of spectrum requirements. On the other hand, our proposed algorithms can easily adapt to the cases where nodes have (different) limited requirements. In particular, a node can stop requiring more channels after all its needs have been satisfied. III. PROBLEM FORMULATION Using the model described earlier, we formulate the channel allocation problem as a graph coloring problem. We abstract the network as a undirected graph G = (V, E, L), where vertexes represent users, and edges represent interferences so that no channels (frequency bands) can be assigned simultaneously to any adjacent nodes. For simplicity, we assume that the interference graph is the same for all frequency bands. This can be generalized to the case where each frequency has its own interference graph, a possible scenario due to the different propagation properties in the environment associated with individual bandwidth. Furthermore, let K be the number of available channels in G. Although it is possible that different channels have different bandwidths, we treat all channels the same for simplicity. We also refer to the graph G as the interference graph. In the paper, we use channel and color interchangeably. Let N = V denote the total number of users. Let edges be represented by the N N matrix E = {e ij }, where e i,j = 1 if there is an edge between vertexes i and j, and e i,j = implies that i and j may use same frequencies. Note that since G is an un-directional graph, E is symmetric. In a similar notation, we represent the availability of frequencies at vertexes of G by a N K matrix L = {l ik }, which we refer to as the coloring matrix. In particular, l ik = 1 means that color (channel) k is available at vertex i, and l ik = otherwise. For instance, Figure 1 is represented by the matrices E = , L = Let us denote a color/channel assignment policy by an N K matrix S = {s ik }, where s ik = or 1, and s ik = 1 if color k is assigned to the node i and otherwise. We call S a feasible assignment if the assignments satisfy the interference graph constraint and the color availability constraint. More specifically, for any node i, we have s ik = if l ik = (i.e.,
3 a color can be assigned only if it is available at the node). Furthermore, s ik s jk e ij =, i, j = 1,, N, k = 1,, K. In other words, two connected nodes cannot be assigned same colors. The objective of the resource allocation is to maximize the spectrum utilization. This problem can be formally represented as the following non-linear integer programming problem. maximize S N i=1 k=1 subject to s ik l ik, K s ik (1) s ik s jk e ij =, s ik =, 1, for all i, j = 1,, N, k = 1,, K. The above problem is sometimes referred to as a list multi-coloring problem. When time is taken into account, a time index can be introduced into the equation where the objective is to maximize the utilization averaged over time and the three constraints are satisfied at each time instance. The corresponding decision list-coloring problem is formulated below. Definition 1: (DListColor Problem) Given a graph G = (V, E, L) and a positive integer B. Is there a solution such that N i=1 k=1 K s ik > B, (2) with the same set of constraints as in Eq. (1)? Proposition 1: The DListColor problem is NP-complete. Proof: This problem is clearly in NP since once a valid coloring assignment S is obtained, condition (2) may be verified in O( V K) time. We now show that the maximum clique problem 1 can be reduced to the DListColor problem in polynomial-time, and that the maximum clique problem has a solution if and only if DListColor has a solution. Let G = (V, E) be the undirected graph of the maximum clique problem. We construct the graph G = (V, E, L) for our DListColor problem, such that V = V, and E is the complimentary set of E. Furthermore, the color matrix L is of dimension V 1, where L = [1, 1,..., 1] T. Since any pair of nodes connected in G are not connected in G and vice versa, we cannot simultaneously assign nodes in G the same color if these nodes form a clique in G. Therefore, there exists a clique in G of size at least m if and only there is no solution for DListColor for B = V m. This reduction is obviously polynomial-time. Q.E.D. 1 A clique is a fully connected subgraph; i.e., a clique consists of a set of nodes any pair of which has an edge in between. A. Color Decoupling The list-coloring problem may be reduced to a set of maximum size clique problems when fairness is not a consideration. In other words, in the process of finding the maximum in Eq. (1), nodes are allowed to be assigned zero channels. The problem of assigning each nodes with a set of colors may be solved by coloring the graph in sequence with individual colors: maximize S N K K s ik i=1 k=1 k=1 maximize S k N s ik (3) i=1 where S k denotes the channel allocation with respect to channel (color) k. More specifically, S k is the kth column in the assignment matrix S. Note that the equality in (3) does not hold in general situations, e.g., a graph coloring problem that requires each node to be colored with non-empty colors. Note that when fairness is taken into account, e.g., each node has to be assigned at least one color, then the decoupling property does not apply. IV. PROPOSED ALGORITHMS In this section, we discuss several approaches to the resource allocation problem formulated above. We prefer distributed algorithms because of their robustness and scalability. We use a brute force search algorithm with which we find optimal solutions to serve as a benchmark. Because the resource allocation problem is NP-complete, optimal solutions may only be found when graphs are relatively small. We then present a distributed greedy algorithm, a distributed fair algorithm, and a distributed randomized algorithm with various complexity and performance. A. Optimal Solutions: Benchmark Given the list-coloring problem and a graph G = (V, E, L), we seek the solutions to the following optimization problem (1). As discussed in Section II, the optimization problem is NP-complete. Therefore, in order to find the optimal solution(s), we must search through all valid color assignments, and find the one(s) that maximizes (1). We carry out this search in a breadth-first recursive manner, with the starting node chosen arbitrarily. More specifically, when the node i is visited, we enumerate all combination of channel allocations for this node permissible by the available channels at i, and iterate through each configuration and tentatively assign it to the node. If there is conflict between the current assignment attempt and neighboring nodes whose channels have already been selected, we abort this assignment. The complexity can be reduce if we use the color decoupling property described in Section III-A, and modify our search algorithm so that the color assignment is optimized subsequently for each color. The resulting algorithm has a complexity of O(K 2 N ). However, this reduction of complexity is not achieved without penalty. For example, since channels are assigned independently of each other, it is no longer straightforward to find a policy that assigns each user at least one channel.
4 B. Distributed Greedy Algorithm Because the resource allocation problem is NP-complete, heuristics are needed to study large graphs. In this section, we present a distributed greedy algorithm with the objective of maximizing the utilization. Because of the color decoupling propertied discussed in Section III-A. the distributed greedy algorithm handles colors one by one. For each color, a greedy assignment is calculated to maximize the number of nodes assigned to this color. To elaborate, consider the assignment of the color i. A subgraph G i = {V i, E i } is generated, where a node belongs to V i if and only if it belongs to V and color i can be used at the node. An edge connects two nodes in V i if and only if these two nodes are connected in the original graph G. For instance, for the case presented in Figure 1, the subgraph for color A consists of node 1, 2, and, and a link between 1 and 2. The greedy algorithm performs as if nodes are ranked according to their link degrees from low to high for each color. Then the color is assigned to the nodes according to their link degrees from low to high. When a tie exists, the number of assigned colors of each node is used to break the tie. Nodes with less assigned colors has higher priority. If the nodes have the same number of assigned colors, ties are broken randomly. The algorithm can result in very unfair allocation. Node with lower link degrees will obtain more resource in general. C. Distributed Fair Algorithm As discussed in the previous section, the greedy algorithm can result in very unfair allocations. In this section, we discuss a distributed algorithm with fairness considerations. The algorithm has three steps. Step 1 is to build an acyclic directional graph. The building of the acyclic directional graph is motivated by [7], although the link degrees of nodes are not taken into account in [7] and no iteration is required due to the difference in objectives. All nodes exchange information about their link degree, color degree (color degree is the number of available color at each node), and a random number. The edges are oriented from higher color degree to lower; i.e., nodes with smaller number of colors are the receivers. If two connected nodes have the same number of colors, the edge is oriented from high link degree to lower link degree. If there is a tie again, the edge is oriented from the node with the larger random number. Thus, an acyclic directional graph is generated. A node is a sink node if there is no edge oriented from it. A node is a source node if there is no edge oriented to it. Note that it is possible that there are multiple source and sink nodes. Step 2 is to assign colors. At most one color is assigned to each node in one iteration. The color assignment starts with sink nodes. If a node is a sink node, it picks a color that can be used by the minimum number of neighbors. It updates this information to all neighbors, who remove the color from their available color lists. In addition, a set-color token is passed to the neighbors to enable their color searching. If a nonsink node obtains set-color tokens from all its downstream neighbors, the node becomes a sink node and repeats the same process. Thus, the color selection performs from sink to source nodes step by step. Step 3 is to start the next iteration if needed. After a source node performs the process, it generates a reset token and passes to all its neighbors. If a node receives reset tokens from all its upstream neighbors, it sends a reset token to all its downstream neighbors. After all nodes receive reset token, the system resets and go to step 1 with their remaining colors. If a node is out of available color, it quits the operation. When no nodes have available colors remaining, the operation stops. D. Randomized Distributed Algorithm The above distributed algorithms may need a large number of iterations when a large number of nodes and colors are involved. When the size of the network is large, large communication overhead will occur. So the distributed randomized algorithm is proposed to reduce the delay and communication cost. The algorithm is inspired by the IEEE backoff algorithms in MAC protocols, although the objective is different. In 82.11, the station doubles its contention window to reduce the probability of collision when its transmission fails. In our algorithm, a node will increase its chance to win the next color when it fails to get a color contending with its neighbors. Each node generates a random number for each of its available colors uniformly from [, window]. Within one round, the node goes through all its available colors. If it has the highest random number among all its neighbors for one color, it then wins the color. Then each node exchanges information with its neighbors of what colors it gets and deletes the colors obtained by its neighbors from its own available color list. If it loses one color, it doubles its window; If it wins one color, it divides its window by 2. Then each node recomputes its random number from [, window] and start the next round. The randomized distributed algorithm has a small communication overhead. It also converges faster compared with the distributed fair algorithm, especially when the number of nodes and colors are large. V. NUMERICAL RESULTS In this section, numerical results are used to illustrate the impact of the location-dependency and time-variance of the channel availability and evaluate the performance of the proposed algorithms. We first show study a snapshot of the network. It means that the channel availability is fixed during the executions of the algorithms. Thus, the impact of the location-dependency of the channel availability is illustrated. Then we will introduce the time-variance into the channel availability and evaluate its impact. We measure utilization by computing the average number of channels (colors) assigned to each vertex, which is also referred to as utility. The fairness metric is the variance of channel allocations in each assignment. The smaller the variance, the fairer the assignment. If all nodes obtain the same number of channels in an assignment, then the fairness
5 Utilization Fair Random Greedy Optimal Fig. 2. Primary users Ring Topology Hexagon-Triangle Topol- Fig. 3. ogy Primary users Variance Fair Random Greedy Optimal metric is zero. In general, the fairness metric is not zero even if the assignment is max-min fair, because nodes have different available channels and it may be impossible for all nodes to obtain the same number of channels. A. Simulation Setup Given a topology geographically, we use the following model to generate a snapshot of the channel availability for the nodes of interests. Each channel has N I primary users (also refereed to as interferers) that are uniformly distributed in a unit square area. With probability p I, each of the primary users is active, independent of other users. A channel is available at a vertex (the secondary user) if and only if it is not within the interference range (R I ) of any active primary users of the channel. We generate the availability of K different channels independently. This is similar to the scenarios shown in Figure 1 except that all primary users have the same interference range, R I. We illustrate the results in two fixed topologies. In the fixed topology, unless otherwise specified, we set R I =.1, p I =.2 and K, the total number of channels in the network to be 1. The first topology is a simple six-node ring as shown in Figure 2. The objective here is to study symmetric topologies, where all nodes are identical: each node has two neighbors and the same characteristics of available colors (in a statistical sense). Although not shown here, we observe that all six users obtain roughly the same amount of bandwidth averaged over simulations. The second topology shows a combination of symmetric and asymmetric nodes, as in Figure 3. In particular, node is in the worst position, which interferes with all other nodes. Nodes 1-3 and - are symmetric and so do nodes 7 and 8. B. Performance Under the Snapshot of the Network We first show the performance of the proposed algorithms under the snapshot of the network. We generate 1 different snapshots of the network for each topology. The performance is averaged over all nodes and over all snapshots. Ring: Figure compares the average performance (average over all nodes and over all simulations) of the four algorithms in different sets of parameters in the Ring topology. The first subplot compares the average utility (number of channels assigned per node) of the four algorithms. We observe that in all cases, the greedy algorithm can always achieve the same utilization as the optimal solution, followed by the randomized and fair algorithms. With the increase of N I, each Utilization Fig.. Ring performance Fig.. Index Hexagon-triangle topology bar Fair Random Greedy Optimal node observes less available channels, and thus lower average utility. As an illustration of fairness, the second subplot shows the variance among different nodes of the four algorithms, which is the variance of each allocation schemes averaged over 1 simulations. The fair algorithm has the lowest average variance value and thus claims the most fair. The random and greedy algorithm have similar performance. In summary, in the Ring topology, the greedy algorithm can achieve the best utilization at the cost of relatively high variance. The fair algorithm can achieve the smallest variance, but also with the smallest utilization. The randomized algorithm has the moderate performance among the three. The advantage of the randomized algorithm is that it has the smallest communication overhead and convergence time. Such performance reflects the difference in the design principle of the three algorithms. Hexagon-triangle: The performance of the three algorithms is similar to that under the Ring topology, which is ignored here. To further understand the principle of the algorithms, let us take a look at Figure. It shows the performance of different algorithms at different nodes. The four bars from left to right are the results of the fair, randomized, greedy and optimal algorithms. Since Node is the node which interferes the most number of other nodes, the optimal and greedy algorithms allocate least spectrum to it in order to maximize the total utilization. In contrast, the fair and randomized algorithms allocate much more spectrum to Node so that they are fairer than the optimal and greedy algorithms. For the fair algorithm, Node has a slightly lower allocation compared with other nodes because it is more likely to run out of colors first. Similar result is also observed for the randomized algorithm, where Node needs to compete with 8 other nodes.
6 Utilization Variance Fig.. Fair Random Greedy Fair Random Greedy Real-time Convergence Real-time Convergence Real-time vs. convergence in the Ring topology C. Performance Under the Time-varying Channel Availability In the above studies, we focused on the snapshot of the system where the channel availability of the primary users is fixed after it is generated. In practice, the channel availability is time-varying due to the traffic activity of the primary users. So it is essential to study the impact of the time-varying channel property on the performance of the proposed algorithms. We introduce the time-varying channel availability at secondary users by varying the usage of primary users as discussed in Section II. In the simulation, we set p 11 =.8 and p 1 =.2. Such policy can be considered as an approximate exponential ON/OFF traffic model for the primary users with an average ON/OFF period of time slots. We assume that in each time slot, secondary users can only exchange information once. This can happen when the changes of channel availabilities are relatively fast and the information exchanges channel between secondary users have limited bandwidth and/or experience delay. This constraint is imposed to test the real-time performance of the proposed algorithms that may not converge in one iteration. That is, after one time slot, not all the available channels will be assigned. We call this partial assignment real-time performance. We are interested in the difference between the real-time performance and off-line converged performance, i.e., difference between the partial channel allocation done in one time slot and the converged result, where the latter is what we get under the snapshot of the network. Such difference reveals the impact of the time-varying channel availability on the performance of the proposed algorithms. The smaller the difference, the better the performance when the proposed algorithms are used under time-varying channel availabilities. Figure show the performance comparisons among three distributed algorithms in the Ring topology (similar performance is observed under H-T topology). We do not show the performance of the optimal algorithm because it only serves as a benchmark under the snapshot of the network. In the simulation, the total number of channels is still 1, and the number of primary users is 8. As shown in the figures, the randomized algorithm has the smallest difference in the utilization between the real-time and convergence performance, followed by the greedy algorithm. The fair algorithm has the largest difference between the real-time and convergence performance. Recall that, the randomized algorithm is designed with the objective of small communication overhead and short convergence time. It means that the randomized algorithm allocates most of the available channels in the first iteration. On the other hand, due to the complexity of the fair algorithm, it can only allocate a small portion of its available channels in one iteration, leading to the large difference. The small variance of the fair algorithm is caused by the small value of the assigned colors. Since the variance is defined as the standard deviation, the variance could also be small when the value of the assigned colors is small. From the above results, we can conclude that the timevarying channel availability does affect the performance of the proposed algorithms. But the difference between real-time and convergence performance is not very large, especially for the randomized and greedy algorithms. Under the time-varying channel availability, the randomized algorithm has the smallest difference between the realtime and convergence performance due to its low complexity. The fair algorithm has the largest difference and the greedy performs in between. In a network with opportunistic spectrum availability and access, the channel allocation algorithm may only have limited information exchange before the current channel availability changes. Therefore, the algorithm with low complexity and communication overhead is preferred due to the time-variance in channel availabilities. VI. CONCLUSIONS In this paper, we present a framework to illustrate the relationship between channel availability of secondary users and the usage of primary users. We pointed out two unique properties are inherent to systems with opportunistic spectrum availabilities and are independent to resource allocation schemes. They are location-dependency and time-variance. Based on the framework, we formulate the channel allocation problem as a list-coloring problem with the objective of maximizing the total spectrum utilization. We show the optimal allocation problem is NP-complete and develop several distributed algorithms. The proposed distributed greedy algorithm achieves close to optimal resource utilization. In addition, a distributed fair algorithm is proposed that achieves better fairness while maintaining a good level of spectrum utilization. Last, a distributed randomized algorithm is introduced with low complexity and communication overhead. The performance of the proposed algorithms is validated in scenarios with time-varying and location dependent channel availabilities. In particular, the greedy and the randomized algorithms are shown to remain effective under scenarios where users have only limited information exchange ability. Due to the time-variance of the channel availability, algorithms with low complexity and communication overhead are preferred. REFERENCES [1] M. McHenry, Spectrum white space measurements, presented to New America Foundation BroadBand Forum, June 23, Docs/pdfs/DocFile 18 1.pdf.
7 [2] FCC, In the matter of promoting efficient use of spectrum through elimination of barriers to the development of secondary markets, WT Docket No. -23, FCC Rcd 2. [3], Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, notice of proposed rule making and order, FCC [], Establishment of an interference temperature metric to quantify and manage interference and to expand available unlicensed operation in certain fixed, mobile and satellite frequency bands, ET Docket No , FCC [], Promoting efficient use of spectrum through elimination of barriers to the development of secondary markets, WT Docket No. -23, report and order and further notice of proposed rulemaking, FCC (secondary markets report and order and FNPRM). [] DARPA, Defense advanced research projects agency (DARPA) next Generation (XG) communications program, [7] N. Garg, M. Papatriantafilou, and P. Tsigas, Distributed long-lived list colouring: how to dynamically allocate frequencies in cellular networks, Wireless Networks, vol. 8, no. 1, pp. 9, 22.
Collaboration and Fairness in Opportunistic Spectrum Access
Collaboration and Fairness in Opportunistic Spectrum Access Haitao Zheng Wireless and Networking Group Microsoft Research Asia, eijing, P.R. China Email: htzheng@microsoft.com Chunyi Peng Dept. of Automation
More informationALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK
Technical Disclosure Commons Defensive Publications Series September 19, 2017 ALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK Yi Hsuan Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationComplementary Graph Coloring
International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More information6 Randomized rounding of semidefinite programs
6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationDesign Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks
Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic
More informationCoordinated carrier aggregation for campus of home base stations
2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations
More informationNotes for Lecture 24
U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined
More informationMOST attention in the literature of network codes has
3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces
More informationChannel Allocation for IEEE Mesh Networks
Institut für Technische Informatik und Kommunikationsnetze Channel Allocation for IEEE 802.16 Mesh Networks Till Kleisli Master s Thesis MA-2006-24 April 2006 until October 2006 Advisors: Dr. Ulrich Fiedler,
More informationPERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS
International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationSpectrum Auction Framework for Access Allocation in Cognitive Radio Networks
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks
More informationA Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks
A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks Yi Shi Y. Thomas Hou The Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA Abstract Cognitive
More informationSimple Channel-Change Games for Spectrum- Agile Wireless Networks
1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation
More informationThroughout this course, we use the terms vertex and node interchangeably.
Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationOptimal Detector Locations for OD Matrix Estimation
Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More information6. Lecture notes on matroid intersection
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm
More informationRandomized Algorithms
Randomized Algorithms Last time Network topologies Intro to MPI Matrix-matrix multiplication Today MPI I/O Randomized Algorithms Parallel k-select Graph coloring Assignment 2 Parallel I/O Goal of Parallel
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationA Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings
A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO
ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication
More informationOpportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks
1610 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks Shan Chu, Graduate Student Member, IEEE, andxinwang, Member,
More informationOn The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches
On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches E. Miller R. Libeskind-Hadas D. Barnard W. Chang K. Dresner W. M. Turner
More informationarxiv: v3 [cs.dm] 12 Jun 2014
On Maximum Differential Coloring of Planar Graphs M. A. Bekos 1, M. Kaufmann 1, S. Kobourov, S. Veeramoni 1 Wilhelm-Schickard-Institut für Informatik - Universität Tübingen, Germany Department of Computer
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, DC ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMMENTS OF CTIA - THE WIRELESS ASSOCIATION
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Revisions to Rules Authorizing the Operation of Low Power Auxiliary Stations in the 698-806 MHz Band Public Interest Spectrum
More informationApproximability Results for the p-center Problem
Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationIEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks
IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 2 Part 4: Dividing Networks into Clusters The problem l Graph partitioning
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationJ. Parallel Distrib. Comput. Large-scale access scheduling in wireless mesh networks using social centrality
J. Parallel Distrib. Comput. 73 (2013) 1049 1065 Contents lists available at SciVerse ScienceDirect J. Parallel Distrib. Comput. journal homepage: www.elsevier.com/locate/jpdc Large-scale access scheduling
More informationA game theoretic framework for distributed self-coexistence among IEEE networks
A game theoretic framework for distributed self-coexistence among IEEE 82.22 networks S. Sengupta and R. Chandramouli Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ 73
More informationDistributed Rule-Regulated Spectrum Sharing
1 Distributed Rule-Regulated Spectrum Sharing Lili Cao and Haitao Zheng * Department of Computer Science University of California, Santa Barbara, CA 931 U.S.A Email: {lilicao,htzheng}@cs.ucsb.edu Abstract
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More information11.1 Facility Location
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationMedium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing
More informationFUTURE communication networks are expected to support
1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,
More informationLink Scheduling in Multi-Transmit-Receive Wireless Networks
Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology
More informationCHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)
92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)
More informationLecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)
Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationDevice-to-Device Networking Meets Cellular via Network Coding
Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE
More informationSelf-coordinating Localized Fair Queueing in Wireless Ad Hoc Networks
To appear in IEEE Transactions on Mobile Computing, Vol. 3, No. 1, January-March 2004 1 Self-coordinating Localized Fair Queueing in Wireless Ad Hoc Networks Haiyun Luo, Jerry Cheng, Songwu Lu UCLA Computer
More informationCSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks
CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCognitive Radios In TV White Spaces
Cognitive Radios In TV White Spaces Monisha Ghosh Philips Research North America November 2 nd, 2007 Outline White Spaces : what, why and when Cognitive Radio: applications to TV white spaces. Technical
More informationMultichannel Outage-aware MAC Protocols for Wireless Networks
Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationFPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs
FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationDistributed Fault-Tolerant Channel Allocation for Cellular Networks
1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationMulti-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More informationRandomized algorithms have several advantages over deterministic ones. We discuss them here:
CS787: Advanced Algorithms Lecture 6: Randomized Algorithms In this lecture we introduce randomized algorithms. We will begin by motivating the use of randomized algorithms through a few examples. Then
More informationOn the Complexity of Broadcast Scheduling. Problem
On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationEmpirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars
Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars Samuel Tigistu Feder * Abstract This paper addresses the problem of scheduling
More information36 IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 1, MARCH 2008
36 IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 1, MARCH 2008 Continuous-Time Collaborative Prefetching of Continuous Media Soohyun Oh, Beshan Kulapala, Andréa W. Richa, and Martin Reisslein Abstract
More informationUML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM
NAME: This exam is open: - books - notes and closed: - neighbors - calculators ALGORITHMS QUALIFYING EXAM The upper bound on exam time is 3 hours. Please put all your work on the exam paper. (Partial credit
More informationPrioritized Access in a Channel-Hopping Network with Spectrum Sensing
Prioritized Access in a Channel-Hopping Network with Spectrum Sensing NSysS, January 9, 206 Outline The problem: traffic prioritization in cognitive networks, and ways to achieve it Related work Details
More informationMaximizing edge-ratio is NP-complete
Maximizing edge-ratio is NP-complete Steven D Noble, Pierre Hansen and Nenad Mladenović February 7, 01 Abstract Given a graph G and a bipartition of its vertices, the edge-ratio is the minimum for both
More informationHardness of Subgraph and Supergraph Problems in c-tournaments
Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in
More informationNew Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band
New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More information13 Sensor networks Gathering in an adversarial environment
13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,
More informationGraph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks
1 Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks Sameer Swami 1, Chittabrata Ghosh 2, Rucha P. Dhekne 2, Dharma P. Agrawal 2, and Kenneth A. Berman 1 Laboratory
More informationarxiv: v2 [cs.ni] 23 May 2016
Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science
More informationSeminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm
Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of
More informationCognitive Radio Network Security- A Survey
Cognitive Radio Network Security- A Survey Roshan Singh Thakur Prof. Parul Bhanarkar Prof. Girish Agarwal ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL College of Engineering,Nagpur College
More informationJuly 23, 2015 VIA ELECTRONIC FILING. Marlene H. Dortch, Secretary Federal Communications Commission th Street, SW Washington, DC 20554
July 23, 2015 VIA ELECTRONIC FILING Marlene H. Dortch, Secretary Federal Communications Commission 445 12 th Street, SW Washington, DC 20554 Re: Amendment of Part 15 of the Commission s Rules for Unlicensed
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationModule 6 NP-Complete Problems and Heuristics
Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationStochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks
336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,
More informationOptimal Power Control, Scheduling and Routing in UWB Networks
TECHNICAL REPORT IC/23/61 1 Optimal Power Control, Scheduling and Routing in UWB Networks Božidar Radunović and Jean-Yves Le Boudec bozidar.radunovic@epfl.ch, jean-yves.leboudec@epfl.ch EPFL, CH-11 Lausanne,
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More information